Lecture 7. Public Key Cryptography (Diffie-Hellman and RSA)
|
|
- Dortha Lloyd
- 5 years ago
- Views:
Transcription
1 Lectue 7 Pulic Key Cytogahy (Diffie-Hellman and RSA) 1
2 Pulic Key Cytogahy Asymmetic cytogahy Invented in (Diffie-Hellman and Rivest-Shami- Adleman) Two keys: ivate (SK), ulic (PK) Encytion: with ulic key; Decytion: with ivate key Digital Signatues: Signing y ivate key; Veification y ulic key. i.e., encyt message digest/hash -- h(m) -- with ivate key Authoshi (authentication) Integity: Simila to MAC Non-eudiation: can t do with secet key cytogahy Much slowe than conventional cytogahy Often used togethe with conventional cytogahy, e.g., to encyt session keys 2
3 Pulic Key Cytogahy Bo s ulic key PK B Bo s ivate key SK B laintext message, m encytion algoithm cihetext PK (m) B decytion algoithm laintext message m SK (PK (m)) B B 3
4 Key Pe-distiution: Diffie-Hellman New Diections in Cytogahy 1976 System wide aametes : lage ime, a geneato in Z Alice's secet: v, ulic: Bo's secet: w, ulic: Alice has: Bo has: * v y a a w y a w y a v y a v K ( y ) a w K ( y ) a a a 4
5 Pulic Key Pe-distiution: Diffie-Hellman Alice comutes K a Secue communication Bo comutes K a K a with K a Eve knows:, a, y a and y 5
6 Pulic Key Pe-distiution: Diffie-Hellman Diffie Hellman Polem: lage ime, a geneato in Z Given : v w y a and y a a vw FIND : a * Discete Log Polem: Given : v y a a FIND : v 6
7 Pulic Key Pe-distiution: Diffie-Hellman Decision DH Polem: lage ime, a geneato Given : v w y a, y a a Distinguish : vw K a a fom a andom nume! DH Assumtion: DH olem is HARD (not P) DL Assumtion: DL olem is HARD (not P) DDH Assumtion: solving DDH olem is HARD (not P) 7
8 Choose andom v Inteactive (Pulic) Key Exchange: Diffie-Hellman y a a v Comute v K ( y ) a y w a Choose Secue communication andom w, Comute K a ( y a ) w with K a Eve is assive 8
9 The Man-in-the-Middle (MitM) Attack (assume Eve is an active advesay!) Choose andom v y a a v Comute v K ( y ) a y a w Secue communication with Ka Choose andom w, Comute K a ( y a ) w 9
10 RSA (1976-8) Let n q whee,q lage imes e,d R Z n and ed 1 Φ(n) whee : Φ(n) ( 1)(q 1) q q 1 Secets :,q,d Pulics : n,e Encytion : message m < n E(x) y m e n Decytion : cihetext y D( y) x' y d n 10
11 Why does it all wok? x Z n * x ed x 1Φ(n) n x c*φ(n)+1 n x But, ecall that: g Φ(n) 1 n (Lagange) 11
12 How does it all wok? Examle: 5 q7 n35 (-1)(q-1)243*2 3 ick e11, d11 x2, E(x) y y18, D(y) e Examle: 17 q13 n221 (-1)(q-1) *2 ick e5, d77 Can we ick 16? 9? 27? 185? x5, E(x) D(y) e
13 Why is it Secue? Conjectue: eaking RSA is olynomially equivalent to factoing n. Recall that n is vey, vey lage! Why: n has unique factos, q Given and q, comuting (-1)(q-1) is easy: ed 1 Φ( n) Use extended Euclidian! 13
14 Exonentiation Costs Intege multilication -- O( 2 ) whee is itsize of ase m Modula eduction -- O( 2 ) Thus, ula multilication -- O( 2 ) Modula exonentiation -- m e n Naïve method: e-1 ula oducts -- O( 2 *e) BUT what if e is lage, (almost) as lage as n? Let L e (e.g., L1024 fo 1024-it RSA exonent) We can assume and L ae close Squae-and-multily method woks in O( 3 ) time O( 2 *2L) 14
15 Squae-and-Multily goal : comute l sizeof ( n); tem 1; fo ( i l 1; i > 0; i ) { tem* tem; tem % n; if ( e[i] ) { tem* m m; tem% n; } } e n Fom left to ight in e Examle 1: e100 Examle 2: e Examle 3: e
16 Seeding u RSA Decytion Let : C - RSA cihetext d d ( 1) d d ( q 1) q comute: M C q M C q q and solve: M M M M q d d q M [ M + M q ( q( q 1 1 ) q)]( q) 16
17 Moe on RSA Modulus n is unique e use à cannot shae n What haens if Alice and Bo shae the same ulus? Alice has (e,d,n) and Bo (e,d,n) Alice wants to comute d (Bo s ivate key) She knows that: e * d 1 hi(n) So: e * d k * hi(n) + 1 and: e * d - 1 k * hi(n) Alice just needs to comute invese of e X whee X e * d 1 k * hi(n) let s call this invese d and ememe that: d * e k * k * hi(n) + 1 can we e sue that: d d? Is it ossile that e has no invese X? Yes, if e hi(n) o gcd(e,k)>1 ut this is vey, vey UNLIKELY! Fo all decytion uoses, d is EQUIVALENT to d Suose Eve encyted fo Bo: C (m) e n Alice comutes: C d n m e d n (m) k * k * hi(n) + 1 n m 17
18 Lectue 8 Pulic Key Cytogahy: Encytion + Signatues 18
19 El Gamal PK Cytosystem (83) lage ime ase, imitive element, geneato x ivate exonent x y ulic esidue; y * P Z * * C Z Z ulics :,, y secets : x Encytion : 1. geneate andom Z 1 2. comute : k x 3. comute : c my m 4. cihetext {k,c} Decytion : x 1. comute k x 1 2. comute ( k ) x 1 x x 3. m' ( k ) c m m 19
20 20 El Gamal (Examle) * Decytion : {10,2} cihetext *5 c k m Encytion : y 9 x 2 13
21 Digital Signatues I did not have intimate elations with that woman,, Ms. Lewinsky Integity Authentication Non-Reudiation Time-Staming Causality Authoization If you like you cuent health insuance lan, you can kee it! 21
22 Digital Signatues A signatue scheme: (P,A,K,Sign,Veify) P - laintext (msgs) A - signatues K - keys Usually message hash Sign - signing function: (P*K)->A Veify - veification function: (P*A*K) à {0,1} 22
23 RSA Signatue Scheme Use the fact that, in RSA, encytion eveses decytion Let n q whee ¹ q ae two (lage) imes eî Z * F( n) Sign( m) : y and e d m Veification : signatue y Veify ( y, m) : ( m d y -1 F(n) ( -1)(q -1) Secets :, q, d Pulics : n, e Signing : message m n e Φ(n) and ed º 1 Φ(n) )??? 23
24 RSA Signatue Scheme (contd) The Good: Veification can e chea (like RSA encytion) Mechanically same as RSA decytion function Secuity ased on RSA encytion Signing is hade ut #veify-s > 1 Deteministic The Bad: Recall that RSA is malleale: signatues can e massaged Phony andom signatues comute YRSA(e,X)X e n X is a signatue of Y ecause Y d X n The Ugly: Signing equies integity! How to sign multile locks? Deteministic needs additional andomization! 24
25 25 El Gamal Signatue Scheme m x m x xk m x c k m c k x k y notice that k y Veifying {k,c} signatue xk m comute : c k comute Z geneate andom Signing x : secets y ulics Z Z A Z P y ulic esidue y ivate exonent x geneato ase, ime lage + ) / / ( 1 1 * * * ) ( :??? : 4. 1 ) ( 3. : :,, : ;
26 26 El Gamal PK Cytosystem m m c k m' k comute comute k Decytion : {k,c} cihetext m my comute : c k comute Z geneate andom Encytion x : secets y ulics Z Z C Z P y ulic esidue y ivate exonent x geneato imitive element, ase, ime lage x x x x x x x ) ( 3. ) ( : :,, : ; * * * * m x m x xk m x c k m c k x k y notice that k y Veifying {k,c} signatue xk m comute : c k comute Z geneate andom Signing x : secets y ulics Z Z A Z P y ulic esidue y ivate exonent x geneato ase, ime lage + ) / / ( 1 1 * * * * ) ( :??? : 4. 1 ) ( 3. : :,, : ; El Gamal Signatue Scheme
27 El Gamal Signatue Scheme (contd) The good: Signing is chea(e) Designed as a signatue function Non-deteministic (andomized) The ad: Need GOOD souce of andom numes Randomizes cannot e evealed (tace) Randomizes cannot e eused 27
28 The Digital Signatue Standad (DSS) Why DSS? RSA issues: atents, malleaility, etc. A vaiant of El Gamal Oiginally fo 512 its, now u to 1024 Otimized fo signatue size (320- vs it) Signing - 1 ex, veification - 2 exs No attacks thus fa 28
29 DSS (contd) lage ime ase, geneato x ivate exonent x y ulic esidue; y * * * P Z, A Z Z ulics :,, y secets : x Signing : 1. geneate andom Z 2. comute : k 3. comute : c ( m xk) 4. signatue {k,c} Veifying : k c y k m * 1 1??? it ime q 160 it ime, ( 1)%q 0 ase, q 1 ( δ ( 1)/q ) x ivate exonent y ulic esidue; y x P Z *, A Z q Z q ulics :, q,, y secets : x Signing : 1. geneate andom Z * q1 2. comute : k ( )q 3. comute : c (m + xk) 1 q 4. signatue {k,c} Veifying : ( mc1 k kc1 )q k??? notice that : mc1 y kc1 m/(m+x ) ( x ) ( /(m+x ) (m+x )/(m+x ) 29
30 Identification Pulic key cytogahy can e also used fo IDENTIFICATION Identification is an inteactive otocol wheey one aty: ove (who claims to e, say, Alice) convinces the othe aty: veifie (Bo) that she is indeed Alice Identification can e accomlished with ulic key digital signatues Howeve, signatues eveal infomation Also, signatues ae tansfeale, i.e., anyone can veify them 30
31 The Cave Analogy of Zeo-Knowledge Point A: enty (V)eifie Claustohoic and afaid of the dak Point B (P)ove Claims to have the key V cannot follow P into the cave Locked doo on oth sides 31
32 The Cave Analogy of Zeo-Knowledge The Potocol: 1) V asks someone he tusts to check that the doo is locked on oth sides. 2) P goes into the maze ast oint B (heading eithe ight o left) 3) V looks into the cave (while standing at oint A) Point A Point B 4) V andomly icks ight o left 5) V shouts (vey loudly!) fo P to come out fom the icked diection 6) If P doesn t come out fom the icked diection, V knows that P is a lia and otocol teminates REPEAT (2)-(6) n TIMES 32
33 Fiat-Shami Identification Scheme In Fiat-Shami, ove has an RSA ulus (factoization is secet). n q Factos themselves ae not used in the otocol. Unlike RSA, a tusted cente can geneate a gloal n, used y eveyone, as long as noody knows its factoization. Tusted cente can foget the factoization afte comuting n. 33
34 Fiat-Shami Identification Scheme Secet Key: Pove (P) chooses a andom value 1 < S < n (to seve as the key) such that gcd(s,n) 1 Pulic Key: P comutes IS 2 n, ulishes (I,n) as his ulic key. Puose of the otocol: P has to convince veifie (V) that he knows the secet S coesonding to the ulic key (I,n), i.e., to ove that he knows a squae oot of I n, without evealing S o any otion theeof 34
35 Pove (Alice) Fiat-Shami Veifie (Bo) n, I, S ick andom R; set xr 2 n I, x n quey 0 1 R R * S n Check that: R 2 x n (RS) 2 xi n 35
36 Fiat-Shami Identification Scheme V wants to authenticate identity of P, who claims to have a ulic key I. Thus, V asks P to convince him that P knows the secet key S coesonding to I. 1. P chooses at andom 1 < R < n and comutes: X R 2 n 2. P sends X to V 3. V andomly equests fom P one of two things (0 o 1): (a) () R o RS n 4. P sends equested infomation 36
37 Fiat-Shami ZK Identification Scheme 5. V checks the coect answe: a) R 2? X ( n) o ) (R*S) 2? X*I ( n) 6. If veification fails, V concludes that P does not know S 7. Potocol is eeated t (usually 20, 30, o log n) times, and, if each one succeeds, V concludes that P is the claimed aty. 37
38 What if Pove knows the challenge ahead of time: Case 0 n, I (doesn t know S) ick andom R; set xr 2 n I, x n quey 0 R Check that: R 2 x n 38
39 What if Pove knows the challenge ahead of time: Case 1 n, I (doesn t know S) ick andom R; set xr 2 *I n I, xr 2 *I n quey 1 R*I n (Instead of: R*S n) Check that: (R*I) 2 x*i n 39
40 Fiat-Shami Identification Scheme CLAIM: Potocol does not eveal ANY infomation aout S o Potocol is ZERO-KNOWLEDGE Poof: We show that no infomation on S is evealed: Clealy, when P sends X o R, he does not eveal any infomation on S. When P sends RS n: RS n is andom, since R is andom and gcd(s, n) 1. If advesay can comute any infomation on S fom I, n, X and RS n he can also comute the same infomation on S fom I and n, since he can choose a andom T R S n and comute: X T 2 I -1 (R ) 2 S 2 I -1 (R ) 2 40
41 Secuity Clealy, if P knows S, then V is convinced of his identity. If P does not know S, he can eithe: 1. know R, ut not RS n. Since he is choosing R, he cannot multily it y the unknown value S o 2. choose RS n, and thus can answe the second question: RS n. But, in this case, he cannot answe the fist question R, since he needs to divide y the unknown S. 41
42 Secuity In any case, advesay cannot answe oth questions, since othewise he can comute S as the atio etween the two answes. But, we assumed that comuting S is had, equivalent to factoing n. Since P does not know in advance (when choosing R o RS n) which question that V will ask, he cannot foesee the equied choice. He can succeed in guessing V s question with oaility 1/2 fo each question. The oaility that V fails to catch P in all uns is thus: 2 -t (e.g., 1 in 1,000,000,000 fo t20) 42
Lecture 10. Public Key Cryptography: Encryption + Signatures. Identification
Lecture 10 Public Key Cryptography: Encryption + Signatures 1 Identification Public key cryptography can be also used for IDENTIFICATION Identification is an interactive protocol whereby one party: prover
More informationLecture 8. Public Key Cryptography (Diffie-Hellman and RSA)
Lecture 8 Pulic Key Crytogrhy (Diffie-Hellmn nd RSA) 1 Pulic Key Crytogrhy Asymmetric crytogrhy Inented in 1974-1978 (Diffie-Hellmn nd Riest-Shmir- Adlemn) To keys: rite (SK), ulic (PK) Encrytion: ith
More information10/04/18. P [P(x)] 1 negl(n).
Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the
More informationKey Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University
Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically
More informationQIP Course 10: Quantum Factorization Algorithm (Part 3)
QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse
More informationLecture 25: Pairing Based Cryptography
6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas
More informationAnalysis of Arithmetic. Analysis of Arithmetic. Analysis of Arithmetic Round-Off Errors. Analysis of Arithmetic. Analysis of Arithmetic
In the fixed-oint imlementation of a digital filte only the esult of the multilication oeation is quantied The eesentation of a actical multilie with the quantie at its outut is shown below u v Q ^v The
More informationSecret Exponent Attacks on RSA-type Schemes with Moduli N = p r q
Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More informationCS 188: Artificial Intelligence Fall Announcements
C 188: Atificial Intelligence Fall 2006 Lectue 14: oaility 10/17/2006 Dan Klein UC Bekeley Announcements Gades: Check midtem, p1.1, and p1.2 gades in glookup Let us know if thee ae polems, so we can calculate
More informationC/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22
C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.
More informationWhen two numbers are written as the product of their prime factors, they are in factored form.
10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The
More informationAnnouncements. CS 188: Artificial Intelligence Fall Today. Uncertainty. Random Variables. Probabilities. Lecture 14: Probability 10/17/2006
C 188: Atificial Intelligence all 2006 Lectue 14: oaility 10/17/2006 Announcements Gades: Check midtem, p1.1, and p1.2 gades in glookup Let us know if thee ae polems, so we can calculate useful peliminay
More informationCryptography. Lecture 11. Arpita Patra
Cptogaph Lectue Apita Pata Geneic Results in PK Wold CPA Secuit CCA Secuit Bit Encption Man-bit Encption Bit Encption Man-Bit Encption Π CPA-secue KEM Π SKE COA-secue SKE Π Hb CPA-secue Π CCA-secue KEM
More informationProbablistically Checkable Proofs
Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol
More informationSome RSA-based Encryption Schemes with Tight Security Reduction
Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische
More informationLecture 14. Protocols. Key Distribution Center (KDC) or Trusted Third Party (TTP) KDC generates R1
Lectue 14 Potocols 1 Key Distiution Cente (KDC) o Tusted Thid Pty (TTP) KDC genetes R1 lice otins R1 Msg1: K () Msg2: K (R1 K (R1) ) Msg3: K (R1) o otins R1 nd knows to use s key fo communicting with lice
More informationConcurrent Blind Signatures without Random Oracles
Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing
More information9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.
Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this
More informationProvable Security in Cryptography
Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL
More informationAQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013
AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the
More informationQuestion 1: The dipole
Septembe, 08 Conell Univesity, Depatment of Physics PHYS 337, Advance E&M, HW #, due: 9/5/08, :5 AM Question : The dipole Conside a system as discussed in class and shown in Fig.. in Heald & Maion.. Wite
More informationKepler s problem gravitational attraction
Kele s oblem gavitational attaction Summay of fomulas deived fo two-body motion Let the two masses be m and m. The total mass is M = m + m, the educed mass is µ = m m /(m + m ). The gavitational otential
More informationPublic Key Cryptosystems RSA
Public Key Crytosystems RSA 57 17 Receiver Sender 41 19 and rime 53 Attacker 47 Public Key Crytosystems RSA Comute numbers n = * 2337 323 57 17 Receiver Sender 41 19 and rime 53 Attacker 2491 47 Public
More informationChapter 3: Theory of Modular Arithmetic 38
Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences
More informationDESIGN OF BEAMS FOR MOMENTS
CHAPTER Stuctual Steel Design RFD ethod Thid Edition DESIGN OF BEAS FOR OENTS A. J. Clak School of Engineeing Deatment of Civil and Envionmental Engineeing Pat II Stuctual Steel Design and Analysis 9 FA
More informationSolution to HW 3, Ma 1a Fall 2016
Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.
More informationLecture 18: Graph Isomorphisms
INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will
More informationMethod for Approximating Irrational Numbers
Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations
More informationPhys-272 Lecture 17. Motional Electromotive Force (emf) Induced Electric Fields Displacement Currents Maxwell s Equations
Phys-7 Lectue 17 Motional Electomotive Foce (emf) Induced Electic Fields Displacement Cuents Maxwell s Equations Fom Faaday's Law to Displacement Cuent AC geneato Magnetic Levitation Tain Review of Souces
More informationDorin Andrica Faculty of Mathematics and Computer Science, Babeş-Bolyai University, Cluj-Napoca, Romania
#A INTEGERS 5A (05) THE SIGNUM EQUATION FOR ERDŐS-SURÁNYI SEQUENCES Doin Andica Faculty of Mathematics and Comute Science, Babeş-Bolyai Univesity, Cluj-Naoca, Romania dandica@math.ubbcluj.o Eugen J. Ionascu
More informationMechanics Physics 151
Mechanics Physics 151 Lectue 5 Cental Foce Poblem (Chapte 3) What We Did Last Time Intoduced Hamilton s Pinciple Action integal is stationay fo the actual path Deived Lagange s Equations Used calculus
More informationk. s k=1 Part of the significance of the Riemann zeta-function stems from Theorem 9.2. If s > 1 then 1 p s
9 Pimes in aithmetic ogession Definition 9 The Riemann zeta-function ζs) is the function which assigns to a eal numbe s > the convegent seies k s k Pat of the significance of the Riemann zeta-function
More informationTopic 4a Introduction to Root Finding & Bracketing Methods
/8/18 Couse Instucto D. Raymond C. Rumpf Office: A 337 Phone: (915) 747 6958 E Mail: cumpf@utep.edu Topic 4a Intoduction to Root Finding & Backeting Methods EE 4386/531 Computational Methods in EE Outline
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping
More informationA Crash Course in (2 2) Matrices
A Cash Couse in ( ) Matices Seveal weeks woth of matix algeba in an hou (Relax, we will only stuy the simplest case, that of matices) Review topics: What is a matix (pl matices)? A matix is a ectangula
More informationPractice Assignment 2 Discussion 24/02/ /02/2018
German University in Cairo Faculty of MET (CSEN 1001 Computer and Network Security Course) Dr. Amr El Mougy 1 RSA 1.1 RSA Encryption Practice Assignment 2 Discussion 24/02/2018-29/02/2018 Perform encryption
More informationExperiment I Voltage Variation and Control
ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly
More informationPHYS 1444 Lecture #5
Shot eview Chapte 24 PHYS 1444 Lectue #5 Tuesday June 19, 212 D. Andew Bandt Capacitos and Capacitance 1 Coulom s Law The Fomula QQ Q Q F 1 2 1 2 Fomula 2 2 F k A vecto quantity. Newtons Diection of electic
More informationIntroduction to Cryptography. Lecture 8
Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication
More information11.2 Proving Figures are Similar Using Transformations
Name lass ate 11. Poving igues ae Simila Using Tansfomations ssential Question: How can similait tansfomations be used to show two figues ae simila? esouce ocke ploe onfiming Similait similait tansfomation
More informationQuantum Fourier Transform
Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,
More information556: MATHEMATICAL STATISTICS I
556: MATHEMATICAL STATISTICS I CHAPTER 5: STOCHASTIC CONVERGENCE The following efinitions ae state in tems of scala anom vaiables, but exten natually to vecto anom vaiables efine on the same obability
More informationworking pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50
woking pages fo Paul Richads class notes; do not copy o ciculate without pemission fom PGR 2004/11/3 10:50 CHAPTER7 Solid angle, 3D integals, Gauss s Theoem, and a Delta Function We define the solid angle,
More informationA more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c
Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng
More informationNew Finding on Factoring Prime Power RSA Modulus N = p r q
Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq
More informationENEE 457: Computer Systems Security 10/3/16. Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange
ENEE 457: Computer Systems Security 10/3/16 Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange Charalampos (Babis) Papamanthou Department of Electrical and Computer Engineering University of Maryland,
More informationIntroduction Common Divisors. Discrete Mathematics Andrei Bulatov
Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes
More informationProbabilistic number theory : A report on work done. What is the probability that a randomly chosen integer has no square factors?
Pobabilistic numbe theoy : A eot on wo done What is the obability that a andomly chosen intege has no squae factos? We can constuct an initial fomula to give us this value as follows: If a numbe is to
More informationSupplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies
Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp
More information(n 1)n(n + 1)(n + 2) + 1 = (n 1)(n + 2)n(n + 1) + 1 = ( (n 2 + n 1) 1 )( (n 2 + n 1) + 1 ) + 1 = (n 2 + n 1) 2.
Paabola Volume 5, Issue (017) Solutions 151 1540 Q151 Take any fou consecutive whole numbes, multiply them togethe and add 1. Make a conjectue and pove it! The esulting numbe can, fo instance, be expessed
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationPolar Coordinates. a) (2; 30 ) b) (5; 120 ) c) (6; 270 ) d) (9; 330 ) e) (4; 45 )
Pola Coodinates We now intoduce anothe method of labelling oints in a lane. We stat by xing a oint in the lane. It is called the ole. A standad choice fo the ole is the oigin (0; 0) fo the Catezian coodinate
More informationEncapsulation theory: the transformation equations of absolute information hiding.
1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties
More informationMore Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015
More informationCryptography. Primitives and Protocols. Aggelos Kiayias
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction
More informationErrata for Edition 1 of Coding the Matrix, January 13, 2017
Eata fo Edition of Coding the Matix, Januay 3, 07 You coy might not contain some of these eos. Most do not occu in the coies cuently being sold as Ail 05. Section 0.3:... the inut is a e-image of the inut...
More informationOnline-routing on the butterfly network: probabilistic analysis
Online-outing on the buttefly netwok: obabilistic analysis Andey Gubichev 19.09.008 Contents 1 Intoduction: definitions 1 Aveage case behavio of the geedy algoithm 3.1 Bounds on congestion................................
More information2 x 8 2 x 2 SKILLS Determine whether the given value is a solution of the. equation. (a) x 2 (b) x 4. (a) x 2 (b) x 4 (a) x 4 (b) x 8
5 CHAPTER Fundamentals When solving equations that involve absolute values, we usually take cases. EXAMPLE An Absolute Value Equation Solve the equation 0 x 5 0 3. SOLUTION By the definition of absolute
More informationThe Substring Search Problem
The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is
More informationInformation-Theoretic
Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic
More information3.6 Applied Optimization
.6 Applied Optimization Section.6 Notes Page In this section we will be looking at wod poblems whee it asks us to maimize o minimize something. Fo all the poblems in this section you will be taking the
More informationChapter 8 Public-key Cryptography and Digital Signatures
Chapter 8 Public-key Cryptography and Digital Signatures v 1. Introduction to Public-key Cryptography 2. Example of Public-key Algorithm: Diffie- Hellman Key Exchange Scheme 3. RSA Encryption and Digital
More informationPhysics 11 Chapter 3: Vectors and Motion in Two Dimensions. Problem Solving
Physics 11 Chapte 3: Vectos and Motion in Two Dimensions The only thing in life that is achieved without effot is failue. Souce unknown "We ae what we epeatedly do. Excellence, theefoe, is not an act,
More informationComputer Security Laboratory Concordia Institute for Information Systems Engineering Concordia University, Montreal (QC), Canada
2005 Intenational Confeence on Wieless Netwoks, Communications and Mobile Computing Impoving the Diffie-Heliman Secue Key Exchange P. Bhattachaya, M. Debbabi and H. Otok Compute Secuity Laboatoy Concodia
More informationMarkscheme May 2017 Calculus Higher level Paper 3
M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted
More informationPhysics 2A Chapter 10 - Moment of Inertia Fall 2018
Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.
More informationToday. CS 188: Artificial Intelligence Spring Probabilities. Uncertainty. Probabilistic Models. What Are Probabilities?
C 188: Atificial Intelligence ping 2006 Lectue 8: oaility 2/9/2006 an Klein UC Bekeley Many slides fom eithe tuat Russell o Andew Mooe oday Uncetainty oaility Basics Joint and Condition istiutions Models
More informationPY208 Matter & Interactions Final Exam S2005
PY Matte & Inteactions Final Exam S2005 Name (pint) Please cicle you lectue section below: 003 (Ramakishnan 11:20 AM) 004 (Clake 1:30 PM) 005 (Chabay 2:35 PM) When you tun in the test, including the fomula
More informationMath 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs
Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let
More informationgr0 GRAPHS Hanan Samet
g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 0 e-mail: hjs@umiacs.umd.edu opyight 199 Hanan
More informationPractice Integration Math 120 Calculus I Fall 2015
Pactice Integation Math 0 Calculus I Fall 05 Hee s a list of pactice eecises. Thee s a hint fo each one as well as an answe with intemediate steps... ( + d. Hint. Answe. ( 8 t + t + This fist set of indefinite
More informationOnline Mathematics Competition Wednesday, November 30, 2016
Math@Mac Online Mathematics Competition Wednesday, Novembe 0, 206 SOLUTIONS. Suppose that a bag contains the nine lettes of the wod OXOMOXO. If you take one lette out of the bag at a time and line them
More informationPage 1 of 6 Physics II Exam 1 155 points Name Discussion day/time Pat I. Questions 110. 8 points each. Multiple choice: Fo full cedit, cicle only the coect answe. Fo half cedit, cicle the coect answe and
More information6 Matrix Concentration Bounds
6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom
More informationPhysics 121 Hour Exam #5 Solution
Physics 2 Hou xam # Solution This exam consists of a five poblems on five pages. Point values ae given with each poblem. They add up to 99 points; you will get fee point to make a total of. In any given
More informationME 3600 Control Systems Frequency Domain Analysis
ME 3600 Contol Systems Fequency Domain Analysis The fequency esponse of a system is defined as the steady-state esponse of the system to a sinusoidal (hamonic) input. Fo linea systems, the esulting steady-state
More informationPractice Integration Math 120 Calculus I D Joyce, Fall 2013
Pactice Integation Math 0 Calculus I D Joyce, Fall 0 This fist set of indefinite integals, that is, antideivatives, only depends on a few pinciples of integation, the fist being that integation is invese
More informationAnonymity-enhanced Pseudonym System
JAIST Reposi https://dspace.j Title Anonymity-enhanced Pseudonym System Autho(s)Tamua, Yuko; Miyaji, Atsuko Citation Lectue Notes in Compute Science, 2 47 Issue Date 2003 Type Jounal Aticle Text vesion
More informationMATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form
MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and
More informationExam 3, vers Physics Spring, 2003
1 of 9 Exam 3, ves. 0001 - Physics 1120 - Sping, 2003 NAME Signatue Student ID # TA s Name(Cicle one): Michael Scheffestein, Chis Kelle, Paisa Seelungsawat Stating time of you Tues ecitation (wite time
More informationATMO 551a Fall 08. Diffusion
Diffusion Diffusion is a net tanspot of olecules o enegy o oentu o fo a egion of highe concentation to one of lowe concentation by ando olecula) otion. We will look at diffusion in gases. Mean fee path
More informationf h = u, h g = v, we have u + v = f g. So, we wish
Answes to Homewok 4, Math 4111 (1) Pove that the following examples fom class ae indeed metic spaces. You only need to veify the tiangle inequality. (a) Let C be the set of continuous functions fom [0,
More information7.2. Coulomb s Law. The Electric Force
Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat
More informationBounds for the Density of Abundant Integers
Bounds fo the Density of Abundant Integes Mac Deléglise CONTENTS Intoduction. Eessing A() as a Sum 2. Tivial Bounds fo A () 3. Lowe Bound fo A() 4. Ue Bounds fo A () 5. Mean Values of f(n) and Ue Bounds
More informationSlides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013
RSA Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013 Recap Recap Number theory o What is a prime number? o What is prime factorization? o What is a GCD? o What does relatively prime
More informationBerkeley Math Circle AIME Preparation March 5, 2013
Algeba Toolkit Rules of Thumb. Make sue that you can pove all fomulas you use. This is even bette than memoizing the fomulas. Although it is best to memoize, as well. Stive fo elegant, economical methods.
More informationPermutations and Combinations
Pemutations and Combinations Mach 11, 2005 1 Two Counting Pinciples Addition Pinciple Let S 1, S 2,, S m be subsets of a finite set S If S S 1 S 2 S m, then S S 1 + S 2 + + S m Multiplication Pinciple
More informationSources of Magnetic Fields (chap 28)
Souces of Magnetic Fields (chap 8) In chapte 7, we consideed the magnetic field effects on a moving chage, a line cuent and a cuent loop. Now in Chap 8, we conside the magnetic fields that ae ceated by
More informationModule 9: Electromagnetic Waves-I Lecture 9: Electromagnetic Waves-I
Module 9: Electomagnetic Waves-I Lectue 9: Electomagnetic Waves-I What is light, paticle o wave? Much of ou daily expeience with light, paticulaly the fact that light ays move in staight lines tells us
More informationCHAPTER 25 ELECTRIC POTENTIAL
CHPTE 5 ELECTIC POTENTIL Potential Diffeence and Electic Potential Conside a chaged paticle of chage in a egion of an electic field E. This filed exets an electic foce on the paticle given by F=E. When
More informationNon-Transferable Proxy Re-Encryption Scheme
Title Non-Tansfeable Poxy Re-Encyption Scheme Autho(s) He, Y; Chim, TW; Hui, CK; Yiu, SM Citation The 5th IFIP Intenational Confeence on New Technologies, Mobility and Secuity (NTMS 12), Istanbul, Tukey,
More informationChapter Eight Notes N P U1C8S4-6
Chapte Eight Notes N P UC8S-6 Name Peiod Section 8.: Tigonometic Identities An identit is, b definition, an equation that is alwas tue thoughout its domain. B tue thoughout its domain, that is to sa that
More informationAP Physics - Coulomb's Law
AP Physics - oulomb's Law We ve leaned that electons have a minus one chage and potons have a positive one chage. This plus and minus one business doesn t wok vey well when we go in and ty to do the old
More informationTrigonometry Standard Position and Radians
MHF 4UI Unit 6 Day 1 Tigonomety Standad Position and Radians A. Standad Position of an Angle teminal am initial am Angle is in standad position when the initial am is the positive x-axis and the vetex
More information. Using our polar coordinate conversions, we could write a
504 Chapte 8 Section 8.4.5 Dot Poduct Now that we can add, sutact, and scale vectos, you might e wondeing whethe we can multiply vectos. It tuns out thee ae two diffeent ways to multiply vectos, one which
More informationPhysics 207 Lecture 5. Lecture 5
Lectue 5 Goals: Addess sstems with multiple acceleations in 2- dimensions (including linea, pojectile and cicula motion) Discen diffeent efeence fames and undestand how the elate to paticle motion in stationa
More informationRigid Body Dynamics 2. CSE169: Computer Animation Instructor: Steve Rotenberg UCSD, Winter 2018
Rigid Body Dynamics 2 CSE169: Compute Animation nstucto: Steve Rotenbeg UCSD, Winte 2018 Coss Poduct & Hat Opeato Deivative of a Rotating Vecto Let s say that vecto is otating aound the oigin, maintaining
More informationInternet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks
Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate
More information